IJCTT - Volume 12 - No 5 Jun 2014

S.No Title/Author Name Paper ID
41. An Efficient Secured Iris Recognition and Verification Based on Multiscale Feature Extraction Technique
- M.SivaSakthi , M.Subha
 IJCTT-V12P141
42. Non-Blocking Approach in Concurrency Control
- Minakshi Sangwan
 IJCTT-V12P142
43. Secure Encryption Method for Biometric Iris Pattern
- Anil Johny , Siyamol Chirakkarottu
 IJCTT-V12P143
44. Accident Prevention System and Security for Vehicles
- D. Haripriya , Puthanial. M , Dr. P. C. Kishore Raja
 IJCTT-V12P144
45. Cloud Based Backup Service
- G Nagi Reddy , Shaik Irfan Babu
 IJCTT-V12P145
46. Cluster Based Anomaly Detection in Wireless LAN
- P.Kavitha , M.Usha
 IJCTT-V12P146
47. A Puzzle Based Client-Server Authentication Model with Secure Data Transfer
- Laxman Dande , Soppari Kavitha , Lt. K.Ravindra Babu , Akash Singh , Kiran Vanam
 IJCTT-V12P147
48. On URL Classification
- Anjali B. Sayamber , Arati M. Dixit
 IJCTT-V12P148
49. Performance Evaluation of OLSR and DSR Routing Protocols for Wireless Sensor Networks (WSN)
- Pratibha , Dr. Prem Chand Vashist
 IJCTT-V12P149
50. Novel Design in Cloud towards the Data Integrity
- G.Naga Sujini
 IJCTT-V12P150
51. Comparative Analysis of Partial Differential Equation-based and Graph Based Methods for Image Segmentation
- A.Ratna Raju , P.Suresh, R.Rajeswara Rao
 IJCTT-V12P151
52. Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems
- G.Kasi Reddy , A.Vijay Kumar , G.Suman Raj , S.Balaji
 IJCTT-V12P152
53. Research Methodology on Security Engineering using Agile Security Architecture Model
- M .Upendra Kumar
 IJCTT-V12P153